BOOK-CHAPTER

A Security Blueprint for E-Business Applications

Abstract

This paper explores the impact of human factor and organizational behavior on the outcome of information technology implementation projects. Client/server technology implementation is used as the leading case, given the fact that it is a good example of a major paradigm shift. The results draw attention to the importance of end-user interaction and the maturity level of organizations as significant factors in the success and benefits of the project. Client/server projects seem to be more successful, are executed in a more timely manner, and yield greater benefits when end users take an active participation in some of the stages, particularly during the implementation phase. Request access from your librarian to read this chapter's full text.

Keywords:
Blueprint Sherwood Applied Business Security Architecture Computer science Computer security Business Information security Engineering Security service Software security assurance Mechanical engineering

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
0
Refs
0.48
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Information and Cyber Security
Physical Sciences →  Computer Science →  Information Systems
Digital Rights Management and Security
Physical Sciences →  Computer Science →  Information Systems

Related Documents

BOOK-CHAPTER

A Security Blueprint for E-Business Applications

Jun DuYuanyuan JiaoJianxin Jiao

IGI Global eBooks Year: 2008 Pages: 3020-3030
BOOK-CHAPTER

A Security Blueprint for E-Business Applications

Jun DuYuanyuan JiaoJianxin Jiao

IGI Global eBooks Year: 2009 Pages: 2131-2142
BOOK-CHAPTER

A Security Blueprint for E-Business Applications

Jun DuYuanyuan JiaoJianxin Jiao

IGI Global eBooks Year: 2011 Pages: 416-426
© 2026 ScienceGate Book Chapters — All rights reserved.